Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. John's

Region: Newfoundland and Labrador

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.2.145.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.2.145.138.			IN	A

;; AUTHORITY SECTION:
.			250	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010801 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 09 11:54:42 CST 2023
;; MSG SIZE  rcvd: 106
Host info
138.145.2.159.in-addr.arpa domain name pointer stjhnf011fw-159-2-145-138.dhcp-dynamic.fibreop.nl.bellaliant.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.145.2.159.in-addr.arpa	name = stjhnf011fw-159-2-145-138.dhcp-dynamic.fibreop.nl.bellaliant.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.75.165.187 attackspam
Oct  3 00:14:25 pornomens sshd\[8067\]: Invalid user 123456 from 106.75.165.187 port 54596
Oct  3 00:14:25 pornomens sshd\[8067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.165.187
Oct  3 00:14:27 pornomens sshd\[8067\]: Failed password for invalid user 123456 from 106.75.165.187 port 54596 ssh2
...
2020-10-04 02:34:18
213.150.206.88 attack
Oct  3 16:11:17 h2829583 sshd[13715]: Failed password for root from 213.150.206.88 port 58296 ssh2
2020-10-04 02:47:16
89.248.160.139 attack
[H1.VM7] Blocked by UFW
2020-10-04 02:44:16
42.194.135.233 attackspambots
(sshd) Failed SSH login from 42.194.135.233 (CN/China/Guangdong/Shenzhen/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 12:14:32 atlas sshd[24972]: Invalid user tiago from 42.194.135.233 port 53532
Oct  3 12:14:34 atlas sshd[24972]: Failed password for invalid user tiago from 42.194.135.233 port 53532 ssh2
Oct  3 12:20:26 atlas sshd[26370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.135.233  user=root
Oct  3 12:20:27 atlas sshd[26370]: Failed password for root from 42.194.135.233 port 42982 ssh2
Oct  3 12:21:40 atlas sshd[26685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.135.233  user=root
2020-10-04 02:54:38
64.225.47.15 attack
Brute%20Force%20SSH
2020-10-04 02:20:49
49.235.142.96 attack
firewall-block, port(s): 4752/tcp
2020-10-04 02:42:08
111.230.233.91 attackspam
(sshd) Failed SSH login from 111.230.233.91 (CN/China/Guangdong/Shenzhen/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  3 05:58:54 atlas sshd[26161]: Invalid user cs from 111.230.233.91 port 54140
Oct  3 05:58:56 atlas sshd[26161]: Failed password for invalid user cs from 111.230.233.91 port 54140 ssh2
Oct  3 06:11:40 atlas sshd[29727]: Invalid user adminuser from 111.230.233.91 port 53936
Oct  3 06:11:41 atlas sshd[29727]: Failed password for invalid user adminuser from 111.230.233.91 port 53936 ssh2
Oct  3 06:15:01 atlas sshd[30430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.233.91  user=root
2020-10-04 02:37:23
209.141.45.234 attackspambots
$f2bV_matches
2020-10-04 02:36:11
45.145.66.104 attackbots
Excessive Port-Scanning
2020-10-04 02:34:03
192.241.235.74 attackbotsspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-04 02:26:06
199.76.38.123 attackbotsspam
$f2bV_matches
2020-10-04 02:19:04
218.92.0.202 attack
2020-10-03T20:30:40.492722rem.lavrinenko.info sshd[27609]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-03T20:31:52.234278rem.lavrinenko.info sshd[27610]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-03T20:32:54.379850rem.lavrinenko.info sshd[27612]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-03T20:34:01.398844rem.lavrinenko.info sshd[27613]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-03T20:35:04.389664rem.lavrinenko.info sshd[27614]: refused connect from 218.92.0.202 (218.92.0.202)
...
2020-10-04 02:35:53
83.221.107.60 attackbotsspam
Oct  3 16:14:38 rush sshd[11045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.221.107.60
Oct  3 16:14:40 rush sshd[11045]: Failed password for invalid user user from 83.221.107.60 port 60596 ssh2
Oct  3 16:18:55 rush sshd[11080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.221.107.60
...
2020-10-04 02:48:25
200.216.68.92 attackspam
1601670953 - 10/02/2020 22:35:53 Host: 200.216.68.92/200.216.68.92 Port: 445 TCP Blocked
2020-10-04 02:29:19
46.37.168.7 attackbots
Automatic report - Banned IP Access
2020-10-04 02:25:40

Recently Reported IPs

16.112.80.19 240e:318:2f95:df10:c88c:5a9d:6365:bdb1 155.158.139.56 151.80.146.194
152.163.110.112 178.108.74.189 148.214.26.37 1.181.101.104
149.202.38.124 145.2.132.247 141.250.127.18 143.147.220.166
141.226.9.242 140.246.3.191 139.121.217.128 132.152.130.83
132.68.147.123 131.230.98.223 131.93.75.76 131.25.129.230